Professional Documents
Culture Documents
IT For Management: On-Demand Strategies For Performance, Growth, and Sustainability
IT For Management: On-Demand Strategies For Performance, Growth, and Sustainability
Chapter 8
• Purchasing Online
o The most well-known B2C site is Amazon.com, whose IT
developments received U.S. patents that keep it ahead of
competition.
o Broader selection, lower prices, and easy searching and
ordering are featured through e-commerce.
o Electronic Wallet (e-wallet ): a software application that can
store encrypted information about a user’s credit cards, bank
accounts, and other information necessary to complete
electronic transactions.
https://www.tokopedia.com/
• Sell-Side Marketplaces
o Where organizations sell their products or services to other
organizations from their own private website or from a third-
party site.
o Similar to B2C model, but the ‘C‘ is an organization.
• Amazon Business
• Alibaba wholesaling Chinese products
• Dell Computer auctions through eBay
Direct
Procurement
Corporate
Procurement
Indirect
procurement
1 •Control Cost
2 •Simplify Process
Copyright ©2018 John Wiley & Sons, Inc. 21
Business to Business (B2B): Electronic Data
Interchange (EDI)
• The Electronic Data Exchange or EDI is a
technology that helps trading organizations and
partners get more done faster by speeding up
logistics timelines and eliminating manual
errors through business to business
communication automation.
Purchase Order
Buyer Seller
Sales Invoice
Example of EDI:
✓ Purchase Order (EDI 850)
✓ Shipping Statuses (EDI 214)
✓ Invoices Custom Information
✓ Payment Information (EDI 820)
• Mobile Retailing
o The use of mobile technology to promote, enhance, and add
to value to the in-store shopping experience.
• Mobile Marketing
o A variety of activities used by organizations to engage,
communicate, and interact over Wi-Fi and
telecommunications networks with consumers using wireless,
handheld devices.
Vishing Again, similar to phishing, but the fraudulent communication comes in the form
of a voice or voicemail message encouraging the victim to divulge secure information.
Lost or stolen phone Lost or stolen cell phones can be used to conduct financial
transactions without the owner’s permission.